Filters








1,516 Hits in 4.5 sec

Editor's Preface for the Second Annual MathCrypt Proceedings Volume

Jung Hee Cheon, Kristin Lauter, Yongsoo Song
2020 Journal of Mathematical Cryptology  
We wanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal of Mathematical Cryptology was an ideal place  ...  Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferences which are the most prestigious venues  ...  of Mathematical Cryptology.  ... 
doi:10.1515/jmc-2020-0170 fatcat:4sq6xvjilzg4ndkihh75zoftii

Foreword. Second Workshop on Mathematical Cryptology

Jaime Gutierrez
2009 Journal of Mathematical Cryptology  
This issue of the Journal of Mathematical Cryptology collects selected papers on work presented to the meeting WMC 2008, held in Santander (Spain), October 23-25, 2008.  ...  The result of the evolution of technology and science is that today we are witnesses of an explosive growth in the applications of mathematics in cryptology.  ...  We also thank the managing editors of the Journal of Mathematical Cryptology, specially Rainer Steinwandt, who offered us the opportunity to do this job.  ... 
doi:10.1515/jmc.2009.008a fatcat:6hco67zkwjhrrdobcz36qppb7a

Charting Arabic Cryptology's Evolution∗

Kathryn A. Schwartz
2009 Cryptologia  
Origins of Cryptology. 3 Each volume summarizes the treatises' cryptologic contributions and offers English translations of the chosen sections alongside the original Arabic.  ...  governments'' [15, p. 68; 12] .  ... 
doi:10.1080/01611190903030904 fatcat:cgryqc3tq5aidm5yzctrg4la74

Frontmatter

2016 Journal of Mathematical Cryptology  
JOURNAL OF MATHEMATICAL CRYPTOLOGY is a forum for original research articles in the area of mathematical cryptology.  ...  Works in the theory of cryptology and articles linking mathematics with cryptology are welcome.  ... 
doi:10.1515/jmc-2016-frontmatter1 fatcat:q6thyjainbet5gnsdcxefliizi

Page 1698 of Mathematical Reviews Vol. , Issue 84d [page]

1984 Mathematical Reviews  
Lipton On January 5—6, 1981, the authors delivered a series of lectures entitled Cryptology in Revolution: Mathematics and Models to a meeting of the Ameri- can Mathematical Society.  ...  This survey of cryptology and computer security is an edited and expanded ver- sion of the notes which the Society published for the original lecture series. The presentation is organized as follows.  ... 

Page 888 of Mathematical Reviews Vol. , Issue 84b [page]

1984 Mathematical Reviews  
On January 5—6, 1981, the authors delivered a series of lectures entitled Cryptology in Revolution: Mathematics and Models to a meeting of the Ameri- can Mathematical Society.  ...  This survey of cryptology and computer security is an edited and expanded ver- sion of the notes which the Society published for the ‘The presentation is organized as follows.  ... 

Page 633 of The Historical Journal Vol. 23, Issue 3 [page]

1980 The Historical Journal  
Secondly, the greater volume of messages enciphered in that single system facilitated its solution.  ...  There are four technical factors, all of which stemmed from purely cryptologic factors.  ... 

Wolfenbüttel, a Minor German Duchy But a Major Center of Cryptology in the Early Modern Period

Gerhard F. Strasser
2017 Tatra Mountains Mathematical Publications  
The analysis shall proceed chronologically and present some relevant examples from the 16th century before focusing on the most important German cryptological author of his time, Duke August the Younger  ...  August had acquired almost 200 volumes relating directly or indirectly to cryptology.  ...  His sole goal in writing the Cryptomenytices was to present "the state of the art", for -as he put it in his Preface -cryptology to him was indeed an art form. 15 Nonetheless he was fully aware of the  ... 
doi:10.1515/tmmp-2017-0018 fatcat:mebipusjbfhgjcix733asydaye

Literary Cryptology, Making the Unreadable Readable in Cummings' Selected Poems 'ygUDuh' and 'r-p-o-p-h-e-s-s-a-g-r'

Yacine Moulai Hacene Yacine Moulai Hacene, TJPRC
2018 International Journal of English and Literature  
Then sessions in cryptology were conducted to make students acquainted with the field of cryptology and provide them with a methodology of how to apply its tools to e.e. cummings' selected poems ygUDuh  ...  After a thorough examination, two main findings arose: First, the participants in this research got familiar with the field of cryptology and its strategies; second, they also found a walkthrough to read  ...  The English poems of George Herbert. Cambridge: Cambridge University Press. Factor (JCC): 6.2987 NAAS Rating: 3.12 15. Vaudenay, S.(2006).  ... 
doi:10.24247/ijeldec20187 fatcat:eskxzhgv4vb5vbtuk3fr72leju

Page 1669 of Mathematical Reviews Vol. 55, Issue 6 [page]

1978 Mathematical Reviews  
This is a new quarterly journal devoted to all aspects of cryptology, with particular emphasis on computational, mathematical and statistical problems in cryptology.  ...  Ames, Mono- tonically convergent upper and lower bounds for classes of conflicting populations (pp. 3-14); H. A. Antosiewicz, A new view on constrained problems (pp. 15-19); H. T.  ... 

Page 3102 of Mathematical Reviews Vol. , Issue 2000d [page]

2000 Mathematical Reviews  
ISBN 3-540-65757-6 From the publisher’s description: “This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998.  ...  Ed. 26 (1998), no. 4, 10-15. Summary: “Two constructions of authentication codes with arbi- tration from symplectic geometry are given. The parameters are computed.  ... 

Frontmatter

2017 Discrete Mathematics and Applications  
The journal contains papers from the Russian-language journal Diskretnaya Matematika, the only journal of the Russian Academy of Sciences devoted to this field of mathematics.  ...  Discrete Mathematics and Applications covers various subjects in the fields such as combinatorial analysis, graph theory, functional systems theory, cryptology, coding, probabilistic problems of discrete  ...  Sergeev Upper bounds for the size and the depth of formulae for MOD-functions 15 Aleksandr A.  ... 
doi:10.1515/dma-2017-frontmatter1 fatcat:7kdayfqrv5e3vd6q2amfcrs55y

Searching for the optimum correlation attack [chapter]

Ross Anderson
1995 Lecture Notes in Computer Science  
The nonlinear lter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream  ...  attacks on certain stream ciphers", in Journal of Cryptology v 1 1989 pp 159 176 MS2 W Meier, O Sta elbach, Nonlinearity criteria for cryptographic functions", in Advances in Cryptology | Eurocrypt 89  ...  12 18 16 26 10 3 20 11 12 19 18 27 18 4 16 12 23 20 12 28 17 5 14 13 13 21 10 29 15 6 21 14 13 22 15 30 19 7 17 15 19 23 15 31 17 We might h a v e hoped that  ... 
doi:10.1007/3-540-60590-8_11 fatcat:fp4biuzdjbhkpm6d2skn564peu

Growth rate of an endomorphism of a group

Kenneth J. Falconer, Benjamin Fine, Delaram Kahrobaei
2011 Groups - Complexity - Cryptology  
Hairy graphs and the cohomology of Out(F_n) Karen Vogtmann, Cornell University Growth rate of an endomorphism of a group  ...  Saturday 3:15 -5:15 Length functions of right-angled Artin groups Ruth Charney, Brandeis University Morgan and Culler proved that a minimal action of a free group on a tree is determined by its length  ...  Kontsevich showed that the homology of Out(F_n) can be identified with the cohomology of a certain Lie algebra A. Morita constructed cocycles from elements of the abelianization of A.  ... 
doi:10.1515/gcc.2011.011 fatcat:r5tisr7odzghlmbzofvjt567ea

The Fiat-Shamir Transformation in a Quantum World [article]

Özgür Dagdelen, Marc Fischlin Tommaso Gagliardoni
2013 arXiv   pre-print
of its witness.  ...  We discuss in particular a version of the Lyubashevsky scheme which is provably secure in the QROM.  ...  Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77–94, 1988. (Cited on page 2.) [Fis05] Marc Fischlin.  ... 
arXiv:1306.0315v1 fatcat:vny4yr7hifgkxp4sg4mdwvsegu
« Previous Showing results 1 — 15 out of 1,516 results